Daniel Huynh
7 articles

Data Scientist working on privacy preserving solutions

Confidential Computing Explained. Part 2 : Attestation
Confidential computing explained. Part 1: introduction
CKKS explained, Part 5: Rescaling
CKKS explained, Part 4: Multiplication and Relinearization
CKKS explained, Part 3: Encryption and Decryption
CKKS explained, Part 2: Full Encoding and Decoding
CKKS explained: Part 1, Vanilla Encoding and Decoding